نتایج جستجو برای: cyber space
تعداد نتایج: 509520 فیلتر نتایج به سال:
Current approaches to cyber-security are not working. Rather than producing more security, we seem to be facing less and less. The reason for this is a multi-dimensional and multi-faceted security dilemma that extends beyond the state and its interaction with other states. It will be shown how the focus on the state and "its" security crowds out consideration for the security of the individual ...
Modern Aerospace systems are cyber-physical, comprised of physical components but commanded and controlled by “cyber” (computing and communication) elements. It is widely acknowledged that codesign across cyber and physical elements will provide a better-performing holistic system, but few of today’s engineers have adequate preparation to model, optimize, and simulate both. Even working in team...
Using the general strain theory as a theoretical framework, the present longitudinal study investigated both face-to-face and cyber victimization in relation to cyber-displaced aggression. Longitudinal data were collected from 130 (70 women) young adults who completed measures assessing their victimization (face-to-face and cyber), cyber aggression, and both face-to-face and cyber-displaced agg...
moving toward third millennium is characterized by capabilities in transforming human life. specially, development of information technologies in everyday life lead to great changes in communication tools andour current understanding ofurban social life. indeed, telecommunications because of independency from time—space constraints, provide a new unlimited space for social interactions in globa...
n this article, attempts to review with a developmental approach to cyberbullying, prevalence and risk and protective factors it. In the present narrative review article, which is done by the method of text research, articles about cyberbullying from 2010 to 2020 were published in the Google Scholar, ScienceDirect, Elsevier, Scopus, ProQuest, Springer, and PubMed databases were extracted and an...
In this paper, we describe Jack-in-the-Net (Ja-Net), a framework to achieve adaptive service composition in a large scale, open network environment. In Ja-Net, a service is implemented by a collection of cyber-entities and provided through cooperative interaction of cyber-entities. Cyber-entities communicate with each other using Ja-Net ACL (Agent Communication Language) and establish relations...
Cyber Crimes are increasing day by day and are posing a great threat to internet users. This paper discusses the Cyber crime, its nature and types. Various tools and techniques used for cyber crime are evaluated in this paper. The paper also discusses cyber related laws under Indian Penal Code and their application to the cyber offences. With the discussion of cyber crimes, this paper proposes ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید